+234 818 340 5221
3-6 Alhaji Adejumo Avenue, Ilupeju, Lagos
enquiries@tranter-it.com
Careers
Events
  • Home
  • Who We Are
  • What We Do
    • IT Services
    • Smart Solutions
    • HR Support Service
  • ManageEngine
    • Reseller Registration
    • Reseller Deal Registration
  • Media and Insights
  • HR Support Services
  • Contact Us
  • Home
  • Who We Are
  • What We Do
    • IT Services
    • Smart Solutions
    • HR Support Service
  • ManageEngine
    • Reseller Registration
    • Reseller Deal Registration
  • Media and Insights
  • HR Support Services
  • Contact Us
  • Home
  • Who We Are
  • What We Do
    • IT Services
    • Smart Solutions
    • HR Support Service
  • ManageEngine
    • Reseller Registration
    • Reseller Deal Registration
  • Media and Insights
  • HR Support Services
  • Contact Us
  • Home
  • Who We Are
  • What We Do
    • IT Services
    • Smart Solutions
    • HR Support Service
  • ManageEngine
    • Reseller Registration
    • Reseller Deal Registration
  • Media and Insights
  • HR Support Services
  • Contact Us
Blog
Blog

WHAT SECURE EMAIL GATEWAYS CAN DO FOR YOUR ENTERPRISE

September 2, 2019 by tranterweb

In June 2018, Unatrac Holding Limited, a company which deals in sales of heavy industrial and farm equipment, was said to have approached the Federal Bureau of Investigations (FBI) over a breach in the email account of its chief financial officer where a fraudulent transfer of funds was done. The intruder was said to have sent phishing emails containing a web link, purportedly to the login page of the CFO’s online email account hosted by Microsoft Office 365. Believing the link to be genuine, the CFO was said to have imputed his username and password from where the intruder got full access to the account and sent a fraudulent wire transfer request to the company’s internal financial team. Acting under the impression that the email emanated from the CFO, the finance staff processed approximately 15 payments between April 11 to 19, 2018, totalling $11 million.

Email security gateways protect enterprises from threats such as spam and phishing attacks. This article explains how these products get the job done.

Companies use email security gateways to prevent email messages that violate an organization’s policies — particularly ones with malicious intent — from reaching their destinations.

All email security gateways have the ability to quarantine or block email that contains detected malware, phishing attacks, spam, as well as other malicious content. This prevents most attacks from reaching their intended recipients, which, in turn, reduces the number of successful compromises of hosts, user credentials and sensitive data.

Some security gateways also offer data loss prevention capabilities that thwart inadvertent or intentional leakage of sensitive information via email messages. This is mainly a concern for outbound traffic — email messages sent from within the organization.

There are many products available. It is not feasible to exhaustively capture the characteristics of every single one, so this article focuses on the most widely used types of gateway products.

The architecture of email security gateways

There are several possible architectures for hosting email gateways, including the following:

1. The email server: Some gateway products are email server-specific — e.g., for Exchange servers only or for Domino servers only — and these products are typically installed directly onto the email server. Most products do not fall into this category.

2. An on-site hardware appliance: The majority of secure email gateway products offer a hardware appliance option. Companies install this dedicated appliance on the organization’s network, and inbound and outbound email traffic is routed through the appliance for analysis and filtering.

3. An on-site virtual appliance: Most vendors offer on-site virtual appliances for email security. Companies can install these virtual appliances as part of a private cloud controlled by the organization, or they can be run on an on-site server without necessarily being part of a cloud architecture.

4. A public cloud: Many email security gateway products are available as public cloud-based services. They function the same way as the on-site appliances do; all inbound and outbound email traffic for an organization is routed through the service.

5. A hybrid approach — combining public cloud and on-site presence: Many vendors offer a hybrid architecture, which combines a public cloud-based service and a locally deployed hardware or virtual appliance.

Each option has advantages and disadvantages in terms of security, performance and reliability. However, all of these architectures ultimately deliver the same type of email analysis and filtering services to their user communities. Email security gateways are strictly that — gateways — and they have no presence on client devices. The lack of a dependency on client-side security controls is important for achieving effective email security in many environments, especially those that have email users with client devices outside the organization’s control, such as bring your own device laptops, smartphones and tablets.

Typical environments suitable for email security gateways

Secure email gateways are a necessity for virtually every organization since email-borne threats are ubiquitous. They allow all types of organizations to boost their security.

Gateways go beyond the traditional detection capabilities of legacy antivirus and antiphishing tools by offering more sophisticated detection and prevention capabilities. They also make use of threat intelligence to stay up to date with the latest threats.

Since email security gateways monitor network traffic, the gateways filter email messages before they reach users’ inboxes. Consequently, they can offer a strong level of protection for email clients on all devices, protecting employees who use their own devices for work or who work remotely. Secure email gateways don’t affect the performance of these devices.

However, to ensure endpoint and mobile security, companies should consider upgrading to cloud versions of their email security gateways that include more advanced phishing protection, particularly to protect against impostor email threats — email fraud — or business email compromise — a financial cyberthreat. Cloud platforms are also more agile and better able to adapt to new threats without the need for administrators to upgrade on-premises appliances or software. Email security gateways are beneficial for organizations that host their own email services and those that outsource their email services, assuming the outsourcer isn’t already providing security gateway services.

Organizations that outsource email services should check with their outsourcer to see what security services they provide, before inadvertently duplicating those services.

The costs of email security gateway adoption and deployment. The cost models for adopting and deploying gateways vary considerably depending on the type of product selected. For example, public cloud-based email security gateway services usually charge per-user, per-month fees. Appliance-based models typically have a flat fee for the appliance itself and may also charge a subscription fee to supply the appliance with the latest threat intelligence information and other updates. Because email security gateways should be transparent to end-users, client support should be minimal. Gateways do make mistakes, but most products are extremely accurate in their classifications of email messages, so it’s quite rare for one to block a nonthreatening message. Such instances may require a gateway administrator to intervene. Some secure email gateways offer add-on security capabilities, such as email encryption. These capabilities generally involve a separate charge in addition to the gateway itself and any support or maintenance subscriptions.

Beefing up organizational security with email security gateways

Secure email gateways prevent malware, phishing attacks, spam and other unwanted email messages from reaching their recipients and compromising their devices, user credentials or sensitive data. Because so many attacks today are email-based, a security gateway can sharply decrease the number of successful attacks against an organization.

Next Steps

With over 146 billion records expected to be stolen over the next five years, enterprises can no longer rest on their laurels when it comes to protecting the data under their care. As recent events show, the impact of data breaches can be severe, not just in terms of monetary losses but also reputational damage.

Speak to a consultant today via call 08183405221/09023416588 or email – enquiries@tranter-it.com.

10 Customer Support Statistics That You Absolutely Need to Know10 Customer Support Statistics That You Absolutely Need to KnowJuly 7, 2019
How to Work From Home: 20 Tips From People Who Do It SuccessfullyApril 1, 2020How to Work From Home: 20 Tips From People Who Do It Successfully

Related Posts

Blog
Tranter IT and ManageEngine 5-Day Resellers Training: Empowering Channel Partners for Excellence
March 17, 2025 by Josephine Lopez
Blog
Securing Your Business: How to Choose the Best Cloud Backup Solution
April 16, 2024 by Olajumoke Olawepo

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories
  • Agriculture (1)
  • Blog (91)
  • cybersecurity (2)
  • Events (14)
  • Gitex2025 (1)
  • IT in Business (4)
  • News Updates (14)
  • Real Estates (1)
  • Smart Cities (2)
  • Smart Solution Case Studies (7)
#blog_module_69b0406981eed.blog-posts .blog-post_title, #blog_module_69b0406981eed.blog-posts .blog-post_title a { font-size:24px; line-height:36px; font-weight:700; }#blog_module_69b0406981eed.blog-posts .blog-post_text { font-size:14px; line-height:24px; }
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
whatsapp-logo